The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Minimum disclosure proofs of knowledge
Journal of Computer and System Sciences - 27th IEEE Conference on Foundations of Computer Science October 27-29, 1986
The knowledge complexity of interactive proof systems
SIAM Journal on Computing
Elements of information theory
Elements of information theory
CDMA: principles of spread spectrum communication
CDMA: principles of spread spectrum communication
Watermarking of uncompressed and compressed video
Signal Processing
Quantifying knowledge complexity
Computational Complexity
Independent component analysis: algorithms and applications
Neural Networks
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Digital watermarking
Attack modelling: towards a second generation watermarking benchmark
Signal Processing - Special section on information theoretic aspects of digital watermarking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Low Cost Attacks on Tamper Resistant Devices
Proceedings of the 5th International Workshop on Security Protocols
Zero Knowledge Watermark Detection
IH '99 Proceedings of the Third International Workshop on Information Hiding
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Information-Theoretic Approach to Steganography and Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Asymmetric Public Detection Watermarking Technique
IH '99 Proceedings of the Third International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
On Defining Proofs of Knowledge
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Commitment Schemes and Zero-Knowledge Protocols
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Fast public-key watermarking of compressed video
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Robust Hash Functions for Digital Watermarking
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Protection of wavelet-based watermarking systems using filter parametrization
Signal Processing - Special section: Security of data hiding technologies
An information-theoretic model for steganography
Information and Computation
Overcoming the obstacles of zero-knowledge watermark detection
Proceedings of the 2004 workshop on Multimedia and security
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Key Independent Watermark Detection
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
Non-interactive watermark detection for a correlation-based watermarking scheme
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Oracle attacks and covert channels
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Security of DM quantization watermarking schemes: a practical study for digital images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
The return of the sensitivity attack
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Information-theoretic analysis of security in side-informed data hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
An asymmetric watermarking method
IEEE Transactions on Signal Processing
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding
IEEE Transactions on Signal Processing
Rational dither modulation: a high-rate data-hiding method invariant to gain attacks
IEEE Transactions on Signal Processing - Part II
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing - Part II
Analysis and design of secure watermark-based authentication systems
IEEE Transactions on Information Forensics and Security
Security of Lattice-Based Data Hiding Against the Known Message Attack
IEEE Transactions on Information Forensics and Security
Power-spectrum condition for energy-efficient watermarking
IEEE Transactions on Multimedia
IEEE Transactions on Information Theory
Mutual information and minimum mean-square error in Gaussian channels
IEEE Transactions on Information Theory
Gradient of mutual information in linear vector Gaussian channels
IEEE Transactions on Information Theory
Copyright labeling of digitized image data
IEEE Communications Magazine
IEEE Journal on Selected Areas in Communications
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A wavelet-based watermarking algorithm for ownership verification of digital images
IEEE Transactions on Image Processing
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on Image Processing
A secure multidimensional point inclusion protocol
Proceedings of the 9th workshop on Multimedia & security
An interpolation-based watermarking scheme
Signal Processing
Machine learning based adaptive watermark decoding in view of anticipated attack
Pattern Recognition
Watermarking Security Incorporating Natural Scene Statistics
Information Hiding
Coding schemes for relay-assisted information embedding
IEEE Transactions on Information Forensics and Security
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
Exploiting security holes in lattice data hiding
IH'07 Proceedings of the 9th international conference on Information hiding
Security analysis of ISS watermarking using natural scene statistics
IH'10 Proceedings of the 12th international conference on Information hiding
A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP) - Special Issue on Multimedia Security
Information theory applications in error bit rate analysis of digital image watermarking
Computers and Electrical Engineering
End-to-end policy based encryption techniques for multi-party data management
Computer Standards & Interfaces
Hi-index | 0.00 |
Watermarking security has emerged in the last years as as a new subject in the watermarking area. As it brings new challenges to the design of watermarking systems, a good understanding of the problem is fundamental. This paper is intended to clarify the concepts related to watermarking security, provide an exhaustive literature overview, and serve as a starting point for newcomers interested in carrying out research on this topic.